Module Name:    src
Committed By:   maxv
Date:           Sat May 19 19:23:15 UTC 2018

Modified Files:
        src/crypto/dist/ipsec-tools/src/racoon: admin.c grabmyaddr.c
            ipsec_doi.c isakmp.c isakmp_agg.c isakmp_base.c isakmp_ident.c
            isakmp_inf.c main.c oakley.c privsep.c remoteconf.c session.c
            vendorid.c

Log Message:
Remove unused variables.


To generate a diff of this commit:
cvs rdiff -u -r1.39 -r1.40 src/crypto/dist/ipsec-tools/src/racoon/admin.c
cvs rdiff -u -r1.35 -r1.36 \
    src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c
cvs rdiff -u -r1.49 -r1.50 src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c
cvs rdiff -u -r1.76 -r1.77 src/crypto/dist/ipsec-tools/src/racoon/isakmp.c
cvs rdiff -u -r1.16 -r1.17 \
    src/crypto/dist/ipsec-tools/src/racoon/isakmp_agg.c
cvs rdiff -u -r1.12 -r1.13 \
    src/crypto/dist/ipsec-tools/src/racoon/isakmp_base.c
cvs rdiff -u -r1.15 -r1.16 \
    src/crypto/dist/ipsec-tools/src/racoon/isakmp_ident.c
cvs rdiff -u -r1.51 -r1.52 \
    src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c
cvs rdiff -u -r1.14 -r1.15 src/crypto/dist/ipsec-tools/src/racoon/main.c
cvs rdiff -u -r1.24 -r1.25 src/crypto/dist/ipsec-tools/src/racoon/oakley.c
cvs rdiff -u -r1.23 -r1.24 src/crypto/dist/ipsec-tools/src/racoon/privsep.c
cvs rdiff -u -r1.28 -r1.29 \
    src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c
cvs rdiff -u -r1.32 -r1.33 src/crypto/dist/ipsec-tools/src/racoon/session.c
cvs rdiff -u -r1.8 -r1.9 src/crypto/dist/ipsec-tools/src/racoon/vendorid.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/crypto/dist/ipsec-tools/src/racoon/admin.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.39 src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.40
--- src/crypto/dist/ipsec-tools/src/racoon/admin.c:1.39	Mon Jun  3 05:49:31 2013
+++ src/crypto/dist/ipsec-tools/src/racoon/admin.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: admin.c,v 1.39 2013/06/03 05:49:31 tteras Exp $	*/
+/*	$NetBSD: admin.c,v 1.40 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: admin.c,v 1.25 2006/04/06 14:31:04 manubsd Exp */
 
@@ -327,7 +327,6 @@ admin_process(so2, combuf)
 
 #ifdef ENABLE_HYBRID
 	case ADMIN_LOGOUT_USER: {
-		struct ph1handle *iph1;
 		char user[LOGINLEN+1];
 		int found = 0, len = com->ac_len - sizeof(*com);
 
@@ -427,7 +426,6 @@ admin_process(so2, combuf)
 		case ADMIN_PROTO_ISAKMP: {
 			struct ph1handle *ph1;
 			struct remoteconf *rmconf;
-			u_int16_t port;
 
 			l_ac_errno = -1;
 

Index: src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.35 src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.36
--- src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c:1.35	Wed Apr 12 16:47:39 2017
+++ src/crypto/dist/ipsec-tools/src/racoon/grabmyaddr.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: grabmyaddr.c,v 1.35 2017/04/12 16:47:39 roy Exp $	*/
+/*	$NetBSD: grabmyaddr.c,v 1.36 2018/05/19 19:23:15 maxv Exp $	*/
 /*
  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
  * Copyright (C) 2008 Timo Teras <[email protected]>.
@@ -140,7 +140,7 @@ myaddr_open_all_configured(addr)
 	struct sockaddr *addr;
 {
 	/* create all configured, not already opened addresses */
-	struct myaddr *cfg, *my;
+	struct myaddr *cfg;
 
 	if (addr != NULL) {
 		switch (addr->sa_family) {
@@ -859,7 +859,6 @@ kernel_sync()
 	caddr_t ref, buf, end;
 	size_t bufsiz;
 	struct if_msghdr *ifm;
-	struct interface *ifp;
 
 #define MIBSIZ 6
 	int mib[MIBSIZ] = {

Index: src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.49 src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.50
--- src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c:1.49	Tue Jun 18 05:39:50 2013
+++ src/crypto/dist/ipsec-tools/src/racoon/ipsec_doi.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: ipsec_doi.c,v 1.49 2013/06/18 05:39:50 tteras Exp $	*/
+/*	$NetBSD: ipsec_doi.c,v 1.50 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: ipsec_doi.c,v 1.55 2006/08/17 09:20:41 vanhu Exp */
 
@@ -264,8 +264,6 @@ get_ph1approval(iph1, doitype, sittype, 
 		for (s = pair[i]; s; s = s->next) {
 			/* compare proposal and select one */
 			for (p = s; p; p = p->tnext) {
-				struct isakmp_pl_p *prop = p->prop;
-
 				sa = newisakmpsa();
 				ctx.p = p;
 				ctx.sa = sa;
@@ -3894,7 +3892,7 @@ set_identifier_qual(vpp, type, value, qu
 		if (loglevel >= LLV_DEBUG) {
 			X509_NAME *xn;
 			BIO *bio;
-			unsigned char *ptr = (unsigned char *) new->v, *buf;
+			unsigned char *ptr = (unsigned char *) new->v;
 			size_t len;
 			char save;
 

Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.76 src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.77
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp.c:1.76	Tue Jan 24 19:23:56 2017
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: isakmp.c,v 1.76 2017/01/24 19:23:56 christos Exp $	*/
+/*	$NetBSD: isakmp.c,v 1.77 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: isakmp.c,v 1.74 2006/05/07 21:32:59 manubsd Exp */
 
@@ -1581,7 +1581,7 @@ int
 isakmp_open(struct sockaddr *addr, int udp_encap)
 {
 	const int yes = 1;
-	int ifnum = 0, encap_ifnum = 0, fd;
+	int fd;
 	struct sockaddr_in *sin = (struct sockaddr_in *) addr;
 #ifdef INET6
 	struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) addr;
@@ -1963,7 +1963,6 @@ isakmp_ph1dying(iph1)
 {
 	struct ph1handle *new_iph1;
 	struct ph2handle *p;
-	struct remoteconf *rmconf;
 
 	if (iph1->status >= PHASE1ST_DYING)
 		return;

Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_agg.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_agg.c:1.16 src/crypto/dist/ipsec-tools/src/racoon/isakmp_agg.c:1.17
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_agg.c:1.16	Fri Sep 18 10:31:11 2009
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_agg.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: isakmp_agg.c,v 1.16 2009/09/18 10:31:11 tteras Exp $	*/
+/*	$NetBSD: isakmp_agg.c,v 1.17 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: isakmp_agg.c,v 1.28 2006/04/06 16:46:08 manubsd Exp */
 
@@ -329,10 +329,6 @@ agg_i2recv(iph1, msg)
 	vchar_t *satmp = NULL;
 	int error = -1;
 	int ptype;
-#ifdef ENABLE_HYBRID
-	vchar_t *unity_vid;
-	vchar_t *xauth_vid;
-#endif
 #ifdef HAVE_GSSAPI
 	vchar_t *gsstoken = NULL;
 #endif

Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_base.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_base.c:1.12 src/crypto/dist/ipsec-tools/src/racoon/isakmp_base.c:1.13
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_base.c:1.12	Thu Mar 12 10:57:26 2009
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_base.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: isakmp_base.c,v 1.12 2009/03/12 10:57:26 tteras Exp $	*/
+/*	$NetBSD: isakmp_base.c,v 1.13 2018/05/19 19:23:15 maxv Exp $	*/
 
 /*	$KAME: isakmp_base.c,v 1.49 2003/11/13 02:30:20 sakane Exp $	*/
 
@@ -297,10 +297,6 @@ base_i2recv(iph1, msg)
 	struct isakmp_parse_t *pa;
 	vchar_t *satmp = NULL;
 	int error = -1;
-#ifdef ENABLE_HYBRID
-	vchar_t *unity_vid;
-	vchar_t *xauth_vid;
-#endif
 
 	/* validity check */
 	if (iph1->status != PHASE1ST_MSG1SENT) {

Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_ident.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_ident.c:1.15 src/crypto/dist/ipsec-tools/src/racoon/isakmp_ident.c:1.16
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_ident.c:1.15	Wed Mar 16 21:09:39 2016
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_ident.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: isakmp_ident.c,v 1.15 2016/03/16 21:09:39 christos Exp $	*/
+/*	$NetBSD: isakmp_ident.c,v 1.16 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: isakmp_ident.c,v 1.21 2006/04/06 16:46:08 manubsd Exp */
 
@@ -1746,7 +1746,6 @@ ident_ir3mx(iph1)
 	int need_cert = 0;
 	int error = -1;
 #ifdef HAVE_GSSAPI
-	int nptype;
 	vchar_t *gsstoken = NULL;
 	vchar_t *gsshash = NULL;
 #endif

Index: src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c:1.51 src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c:1.52
--- src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c:1.51	Tue Jan 24 19:23:56 2017
+++ src/crypto/dist/ipsec-tools/src/racoon/isakmp_inf.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: isakmp_inf.c,v 1.51 2017/01/24 19:23:56 christos Exp $	*/
+/*	$NetBSD: isakmp_inf.c,v 1.52 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: isakmp_inf.c,v 1.44 2006/05/06 20:45:52 manubsd Exp */
 
@@ -129,7 +129,7 @@ isakmp_info_recv(iph1, msg0)
 	int error = -1;
 	struct isakmp *isakmp;
 	struct isakmp_gen *gen;
-	struct isakmp_parse_t *pa, *pap;
+	struct isakmp_parse_t *pa;
 	void *p;
 	vchar_t *hash, *payload;
 	struct isakmp_gen *nd;
@@ -453,10 +453,7 @@ isakmp_info_recv_d(iph1, delete, msgid, 
 	int encrypted;
 {
 	int tlen, num_spi;
-	vchar_t *pbuf;
-	int protected = 0;
 	struct ph1handle *del_ph1;
-	struct ph2handle *iph2;
 	union {
 		u_int32_t spi32;
 		u_int16_t spi16[2];

Index: src/crypto/dist/ipsec-tools/src/racoon/main.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/main.c:1.14 src/crypto/dist/ipsec-tools/src/racoon/main.c:1.15
--- src/crypto/dist/ipsec-tools/src/racoon/main.c:1.14	Sat May 19 18:51:59 2018
+++ src/crypto/dist/ipsec-tools/src/racoon/main.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: main.c,v 1.14 2018/05/19 18:51:59 maxv Exp $	*/
+/*	$NetBSD: main.c,v 1.15 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: main.c,v 1.25 2006/06/20 20:31:34 manubsd Exp */
 
@@ -90,7 +90,7 @@ static char version[] = "@(#) racoon / I
 #endif
 
 static void
-print_version()
+print_version(void)
 {
 	printf("%s\n"
 	       "\n"
@@ -133,7 +133,7 @@ print_version()
 }
 
 static void
-usage()
+usage(void)
 {
 	printf("usage: racoon [-BdFv"
 #ifdef INET6
@@ -264,8 +264,6 @@ parse(int ac, char **av)
 int
 main(int ac, char **av)
 {
-	int error;
-
 	initlcconf();
 	parse(ac, av);
 

Index: src/crypto/dist/ipsec-tools/src/racoon/oakley.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.24 src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.25
--- src/crypto/dist/ipsec-tools/src/racoon/oakley.c:1.24	Wed Aug 29 11:34:37 2012
+++ src/crypto/dist/ipsec-tools/src/racoon/oakley.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: oakley.c,v 1.24 2012/08/29 11:34:37 tteras Exp $	*/
+/*	$NetBSD: oakley.c,v 1.25 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: oakley.c,v 1.32 2006/05/26 12:19:46 manubsd Exp */
 
@@ -1674,9 +1674,6 @@ get_plainrsa_fromlocal(iph1, my)
 	struct ph1handle *iph1;
 	int my;
 {
-	char path[MAXPATHLEN];
-	vchar_t *cert = NULL;
-	char *certfile;
 	int error = -1;
 
 	iph1->rsa_candidates = rsa_lookup_keys(iph1, my);
@@ -2091,8 +2088,6 @@ oakley_savecert(iph1, gen)
 		}
 
 		for (i = 0; i < sk_X509_num(certs); i++) {
-			int len;
-			u_char *bp;
 			X509 *cert = sk_X509_value(certs,i);
 
 			plog(LLV_DEBUG, LOCATION, NULL, 

Index: src/crypto/dist/ipsec-tools/src/racoon/privsep.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/privsep.c:1.23 src/crypto/dist/ipsec-tools/src/racoon/privsep.c:1.24
--- src/crypto/dist/ipsec-tools/src/racoon/privsep.c:1.23	Fri Mar 11 18:28:43 2016
+++ src/crypto/dist/ipsec-tools/src/racoon/privsep.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: privsep.c,v 1.23 2016/03/11 18:28:43 christos Exp $	*/
+/*	$NetBSD: privsep.c,v 1.24 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: privsep.c,v 1.15 2005/08/08 11:23:44 vanhu Exp */
 
@@ -332,7 +332,6 @@ privsep_init(void)
 		struct privsep_com_msg *combuf;
 		struct privsep_com_msg *reply;
 		char *data;
-		size_t *buflen;
 		size_t totallen;
 		char *bufs[PRIVSEP_NBUF_MAX];
 		int i;
@@ -698,7 +697,6 @@ privsep_init(void)
 
 #ifdef ENABLE_HYBRID
 		case PRIVSEP_ACCOUNTING_SYSTEM: {
-			int pool_size;
 			int port;
 			int inout;
 			struct sockaddr *raddr;
@@ -1059,7 +1057,6 @@ privsep_getpsk(str, keylen)
 	vchar_t *psk;
 	struct privsep_com_msg *msg;
 	size_t len;
-	int *keylenp;
 	char *data;
 
 	if (geteuid() == 0)
@@ -1121,7 +1118,7 @@ privsep_socket(domain, type, protocol)
 	size_t len;
 	char *data;
 	struct socket_args socket_args;
-	int s, saved_errno = 0;
+	int s;
 
 	if (geteuid() == 0)
 		return socket(domain, type, protocol);
@@ -1381,7 +1378,6 @@ privsep_accounting_system(port, raddr, u
 	struct privsep_com_msg *msg;
 	size_t len;
 	char *data;
-	int result;
 
 	if (geteuid() == 0)
 		return isakmp_cfg_accounting_system(port, raddr,
@@ -1637,7 +1633,6 @@ privsep_accounting_pam(port, inout)
 	int *port_data;
 	int *inout_data;
 	int *pool_size_data;
-	int result;
 
 	if (geteuid() == 0)
 		return isakmp_cfg_accounting_pam(port, inout);
@@ -1697,7 +1692,6 @@ privsep_xauth_login_pam(port, raddr, usr
 	struct privsep_com_msg *msg;
 	size_t len;
 	char *data;
-	int result;
 
 	if (geteuid() == 0)
 		return xauth_login_pam(port, raddr, usr, pwd);
@@ -1765,7 +1759,6 @@ privsep_cleanup_pam(port)
 	struct privsep_com_msg *msg;
 	size_t len;
 	char *data;
-	int result;
 
 	if (geteuid() == 0)
 		return cleanup_pam(port);

Index: src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.28 src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.29
--- src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c:1.28	Sun Jan  1 15:57:31 2012
+++ src/crypto/dist/ipsec-tools/src/racoon/remoteconf.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: remoteconf.c,v 1.28 2012/01/01 15:57:31 tteras Exp $	*/
+/*	$NetBSD: remoteconf.c,v 1.29 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: remoteconf.c,v 1.38 2006/05/06 15:52:44 manubsd Exp */
 
@@ -168,8 +168,6 @@ rmconf_match_etype_and_approval(rmconf, 
 	int etype;
 	struct isakmpsa *approval;
 {
-	struct isakmpsa *p;
-
 	if (check_etypeok(rmconf, (void *) (intptr_t) etype) == 0)
 		return ISAKMP_NTYPE_NO_PROPOSAL_CHOSEN;
 
@@ -392,7 +390,6 @@ getrmconf(remote, flags)
 	int flags;
 {
 	struct rmconf_find_context ctx;
-	int n = 0;
 
 	memset(&ctx, 0, sizeof(ctx));
 	ctx.sel.flags = flags;
@@ -592,7 +589,6 @@ duprmconf_shallow (rmconf)
 	struct remoteconf *rmconf;
 {
 	struct remoteconf *new;
-	struct proposalspec *prspec;
 
 	new = racoon_calloc(1, sizeof(*new));
 	if (new == NULL)
@@ -1109,10 +1105,7 @@ script_path_add(path)
 {
 	char *script_dir;
 	vchar_t *new_path;
-	vchar_t *new_storage;
-	vchar_t **sp;
 	size_t len;
-	size_t size;
 
 	script_dir = lcconf->pathinfo[LC_PATHTYPE_SCRIPT];
 

Index: src/crypto/dist/ipsec-tools/src/racoon/session.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/session.c:1.32 src/crypto/dist/ipsec-tools/src/racoon/session.c:1.33
--- src/crypto/dist/ipsec-tools/src/racoon/session.c:1.32	Wed Mar  2 15:09:16 2011
+++ src/crypto/dist/ipsec-tools/src/racoon/session.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: session.c,v 1.32 2011/03/02 15:09:16 vanhu Exp $	*/
+/*	$NetBSD: session.c,v 1.33 2018/05/19 19:23:15 maxv Exp $	*/
 
 /*	$KAME: session.c,v 1.32 2003/09/24 02:01:17 jinmei Exp $	*/
 
@@ -124,7 +124,6 @@ static TAILQ_HEAD(fd_monitor_list, fd_mo
 static int nfds = 0;
 
 static volatile sig_atomic_t sigreq[NSIG + 1];
-static struct sched scflushsa = SCHED_INITIALIZER();
 
 void
 monitor_fd(int fd, int (*callback)(void *, int), void *ctx, int priority)

Index: src/crypto/dist/ipsec-tools/src/racoon/vendorid.c
diff -u src/crypto/dist/ipsec-tools/src/racoon/vendorid.c:1.8 src/crypto/dist/ipsec-tools/src/racoon/vendorid.c:1.9
--- src/crypto/dist/ipsec-tools/src/racoon/vendorid.c:1.8	Tue Sep  1 12:22:09 2009
+++ src/crypto/dist/ipsec-tools/src/racoon/vendorid.c	Sat May 19 19:23:15 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: vendorid.c,v 1.8 2009/09/01 12:22:09 tteras Exp $	*/
+/*	$NetBSD: vendorid.c,v 1.9 2018/05/19 19:23:15 maxv Exp $	*/
 
 /* Id: vendorid.c,v 1.10 2006/02/22 16:10:21 vanhu Exp */
 
@@ -133,7 +133,6 @@ static struct vendor_id *
 lookup_vendor_id_by_hash (const char *hash)
 {
 	int i;
-	unsigned char *h = (unsigned char *)hash;
 
 	for (i = 0; i < NUMVENDORIDS; i++)
 		if (strncmp(all_vendor_ids[i].hash->v, hash,
@@ -186,7 +185,6 @@ vchar_t *
 set_vendorid(int vendorid)
 {
 	struct vendor_id *current;
-	vchar_t vid, *new;
 
 	if (vendorid == VENDORID_UNKNOWN) {
 		/*
@@ -218,8 +216,7 @@ set_vendorid(int vendorid)
 static int
 check_vendorid(struct isakmp_gen *gen)
 {
-	vchar_t vid, *vidhash;
-	int i, vidlen;
+	int vidlen;
 	struct vendor_id *current;
 
 	if (gen == NULL)

Reply via email to